US Air Force published a notice that includes a paragraph on the use of  social media platforms for computer network exploitation. In the recent months I had the opportunity to conduct an interesting study on the use of Social Media in the Military Sector, large diffusion of media platforms makes them very attractive for governments […]
F-Secure published the Mobile Threat Report for Q1 2013 that reveals Malware targeting Android devices is rapidly growing in both the number of variants detected and in their complexity and sophistication. F-Secure has published the Mobile Threat Report for Q1 2013, an interesting document that the security firm periodically issues giving information on the evolution […]
Bloomberg was the victim of an accident data breach, financial data and news service posted online more than 10,000 private messages. Bloomberg was the victim of an accident data breach, a shocking news reported that financial data and news service posted online more than 10,000 private messages between traders and clients at some of the […]
Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to defend their assets from the continuous cyber attacks. The press is getting used to news of cyber attacks against companies and government agencies, to date, the trend of the representatives of the cybersecurity of these entities […]
Apple can “bypass the security software” if it chooses, accoring ATF no law enforcement agency could unlock a defendant’s iPhone except Apple that has created a police waiting list because of high demand. Apple is considered an impregnable fortress, the main functions provided by the iOS operating system and related data are inaccessible to ill-intentioned but […]
China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US governments continue to exchange accusations about the continuing incursions into the respective national networks, the cyber attacks are mainly motivated by sabotage and cyber espionage purposes and are increasing exponentially. US government and intelligence agencies […]
OpUSA campaing is officially started, the day has come, today May 7 as announced by Anonymous, a coordinated online attack will hit Banking and government websites. OpUSA campaing is officially started, the day has come, today May 7th as announced by Anonymous, a coordinated online attack against will hit banking and government websites. The announcement made by popular group of hacktivists is creating great […]
Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working  on nuclear weapons research. Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working  on nuclear weapons research, the concerning discovery has been confirmed by principal security firms that revealed that the flaw […]
APWG published the interesting study APWG Mobile Financial Fraud report on the underground marketplace that revealed the explosion of prolific mobile fraud malware market. The APWG Mobile Financial Fraud report resumed The Anti-Phishing Mobile Working Group investigating on the expansion of the black market for mobile malicious code, the study is crucial to understand the evolution of criminal activities […]
Bloomberg published a report on QinetiQ data breach, the company has been compromised from 2007 to 2012 by Chinese hackers. The UK-based defense contractor QinetiQ is vulnerable to cyber attacks, the news is sensational and has created a lot of noise on the Internet, due the critical role of the company as primary providers for U.S. […]